Wed.Apr 17, 2024

article thumbnail

The Global Menace of the Russian Sandworm Hacking Team

Data Breach Today

Russian Cyber Sabotage Unit Sandworm Adopting Advanced Techniques, Mandiant Warns Russia's preeminent cyber sabotage unit presents "one of the widest and high severity cyber threats globally," warned Mandiant in a Wednesday report. Mandiant newly designated Sandworm as APT44 to differentiate it from another hacking unit it will still track as APT28.

IT 191
article thumbnail

Hackers Linked to Russia’s Military Claim Credit for Sabotaging US Water Utilities

WIRED Threat Level

Cyber Army of Russia Reborn, a group with ties to the Kremlin’s Sandworm unit, is crossing lines even that notorious cyberwarfare unit wouldn’t dare to.

Military 108
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

EU Data Regulator Threatens Meta's 'Pay or Okay' Model

Data Breach Today

The European Data Protection Board Says the Company Inhibits Real Choice for Users Social media giant Meta's attempt to navigate European data protection rules by offering a fee-based opt-out from behavioral advertising came under fire Wednesday by a trading bloc agency that said freedom from personalized marketing should typically be free.

147
147
article thumbnail

Using AI-Generated Legislative Amendments as a Delaying Technique

Schneier on Security

Canadian legislators proposed 19,600 amendments —almost certainly AI-generated—to a bill in an attempt to delay its adoption. I wrote about many different legislative delaying tactics in A Hacker’s Mind , but this is a new one.

IT 79
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Key Lawmaker Heralds 'Landmark' Draft Federal Privacy Bill

Data Breach Today

Top Democrat Calls Draft Bill a 'Unique' Chance to Pass Federal Privacy Legislation Rep. Cathy McMorris Rodgers, R-Wa., chair of the House Energy and Commerce Committee, suggested Wednesday that a draft national data privacy bill making its way through Congress could be the best shot in decades for lawmakers to pass a comprehensive federal privacy law.

147
147

More Trending

article thumbnail

Hack on Clinic Serving Homeless Is Latest Hit to Underserved

Data Breach Today

Centers for Underserved Patients, Resource-Poor Communities Fight for Cyber Funds Michigan's largest federally qualified health center, which treats homeless and underserved patients, is notifying more than 184,000 individuals of a December ransomware attack that compromised their data. The incident reflects the many challenges that under-resourced healthcare groups face.

147
147
article thumbnail

Linux variant of Cerber ransomware targets Atlassian servers

Security Affairs

Threat actors are exploiting the CVE-2023-22518 flaw in Atlassian servers to deploy a Linux variant of Cerber (aka C3RB3R) ransomware. At the end of October 2023, Atlassian warned of a critical security flaw, tracked as CVE-2023-22518 (CVSS score 9.1), that affects all versions of Confluence Data Center and Server. The vulnerability is an improper authorization issue that can lead to significant data loss if exploited by an unauthenticated attacker.

article thumbnail

Armis Buys Cyber Remediation Startup Silk Security for $150M

Data Breach Today

Combination of Armis and Silk Will Create Leader in Asset Management, Remediation San Francisco-based asset intelligence vendor Armis plans to embed AI and automation into the incident prioritization and remediation process through the $150 million acquisition of early-stage startup Silk Security to minimize manual intervention and maximize efficiency.

147
147
article thumbnail

Insight is the new GOLD

OpenText Information Management

My children will never face the challenges that I did. No television, no personal cell phones, and don’t ask me about my first computer (which had less capacity than my current iPhone 8). But the reality is that the challenges my children will face will be vastly bigger than mine. Why? Because it’s undeniable, the world we live in today is a world of speed.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Possible Chinese Hackers Use OpenMetadata to Cryptomine

Data Breach Today

Hackers Target OpenMetadata Platforms Running on Cloud Kubernetes Environments Hackers who appear to be Chinese are exploiting vulnerabilities in the OpenMetadata platform running as workloads on Kubernetes clusters to download cryptomining software, warned Microsoft. "I want to buy a car," the hackers tell victims in a note and solicit monero donations.

147
147
article thumbnail

Ivanti fixed two critical flaws in its Avalanche MDM

Security Affairs

Ivanti addressed two critical vulnerabilities in its Avalanche mobile device management (MDM) solution, that can lead to remote command execution. Ivanti addressed multiple flaws in its Avalanche mobile device management (MDM) solution, including two critical flaws, tracked as CVE-2024-24996 and CVE-2024-29204, that can lead to remote command execution.

MDM 64
article thumbnail

Likely Sandworm Hackers Using Novel Backdoor 'Kapeka'

Data Breach Today

Kapeka Shows Similarities to Russian GRU Hacking Group's GreyEnergy Malware Likely Russian military intelligence hackers known as Sandworm since at least mid-2022 have deployed a new and highly flexible back door against Eastern European targets, warn security researchers. Security firm WithSecure dubs the backdoor "Kapeka.

Military 147
article thumbnail

Choosing the right IT security partner: How Jamf fulfills your IT security need

Jamf

Learn how choosing the right partner for your security needs can veritably make or break your cybersecurity plan. Also, gain a better understanding of how Jamf solutions integrate to address the challenges of the modern threat landscape through Trusted Access for top-to-bottom and end-to-end protection of your enterprise.

IT 52
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Free Ransomware: LockBit Knockoffs and Imposters Proliferate

Data Breach Today

Experts See Surge in Attacks, Including in Russia, Using Leaked LockBit Code What do a German healthcare network, a Russian security company and an American bridal clothing retailer have in common? All seem to have been compromised in recent months by attackers who wielded LockBit crypto-locking malware - but who weren't tied to the actual LockBit operation.

Retail 147
article thumbnail

AI & Deepfakes Represent ‘A New Type of Information Security Problem’, Says Drexel’s Matthew Stamm via Drexel News

IG Guru

Check out the article here. The post AI & Deepfakes Represent ‘A New Type of Information Security Problem’, Says Drexel’s Matthew Stamm via Drexel News first appeared on IG GURU.

article thumbnail

Exploited TP-Link Vulnerability Spawns Botnet Threats

Data Breach Today

Attackers Exploit Old Flaw, Hijack TP-Link Archer Routers Half a dozen different botnets are prowling the internet for TP-Link-brand Wi-Fi routers unpatched since last summer with the goal of commandeering them into joining distributed denial-of-service attacks. Chinese router manufacture TP-Link in June patched a command injection vulnerability.

article thumbnail

Archive-It Partner News, April 2024

Archive-It

by the Archive-It team Community News Save the Date for 2024 Partner Meeting Archive-It’s annual Partner Meeting returns in person on Wednesday, August 14, 2024 for a half day in Chicago, just ahead of the 2024 ARCHIVES*RECORDS Society of American Archivists (SAA) conference. Registration and event details will be announced soon. We hope you can join us!

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

How to Start a Career in Cybersecurity

Data Breach Today

A Guide to Seizing Opportunities and Pursuing Growth Our dependence on technology has introduced new and sophisticated cyberthreats that elevate the demand for skilled cybersecurity professionals. The field is expected to experience a surge in job opportunities. Follow these steps to kick-start your career in this challenging yet rewarding field.

article thumbnail

Who uses web archives: How to collect and share Archive-It analytics

Archive-It

by the Archive-It team Archive-It partners met online on April 10 to learn about web archive analytics. Internet Archive staff demonstrated new tools to measure traffic from the live web. Attendees discussed their reporting goals and the data helps them the most. Download the presenters slides ( PDF ) and watch the recording below to catch up anytime: The Internet Archive hosts access data with free open source software developed by Plausible Analytics.

article thumbnail

Big Tech Says Spy Bill Turns Its Workers Into Informants

WIRED Threat Level

One of Silicon Valley’s most influential lobbying arms joins privacy reformers in a fight against the Biden administration–backed expansion of a major US surveillance program.

IT 58